Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

Consider the implications of security breaches on technology adoption as you ans

ID: 3877183 • Letter: C

Question

Consider the implications of security breaches on technology adoption as you answer the following:

Describe a situation, either hypothetical, from your real-life experience, or one you have read about, in which someone might choose not to use the Internet or wireless technology for purchases due to security or privacy concerns.

In this situation, what are the perceived privacy and security threats?

In your opinion, how do the actual threats compare to the perceived threats? Do you believe the shopper’s concerns are warranted in this particular situation? Explain.

Explanation / Answer

One of the situation that happended to me was that I ordered a laptop online via internet and paid for it using my credit card. The laptop was delievered to me successfully and I used it for about a month. After the month was over and when I got my credit card bill, I was surprised and horrified to see my bill. It was a lot and by a lot means too much. When I put a complaint for it, I got to know that the e-commerce company through which I bought the laptop used my credit card details to buy a lot of stuff. Also the laptop they shipped was also infected with malware and they were accessing all my data through my laptop. I filed a case against them and got justice.

The privacy and security threats here are the misuse of the credit card details for wrong purposes and also accessing my person stuff through my laptop.The actual threats are in my opinion more severe than the percieved threats as actual threats can be far more disasterous than percieved threats. The shoppers concerns are not warrented in this situation.